Home Working Creates More Cyber Attacks

A remote workforce comes with  numerous risks, with employees relying on their home networks and sometimes their own devices, to complete tasks. In many cases they will lack the skills to deal with even simple technical issues and will be dependent up remote IT support.

According to Velocity-Smart Technology’s recent research 70% of remote workers said they had experienced IT problems during the pandemic, and 54% had to wait up to three hours for the issue to be resolved.

Remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences.

REvil, a cyber criminal hacking group, chose US Independence Day, 4 July for a number of cyber attacks knowing that many IT and cyber security teams would be on holiday. Over a 1,000 companies in the US, and at least 17 other countries were hacked.  Among those hacked was a well-known software provider, Kaseya.  REvil used Kaseya as a conduit to spread its ransomware through other corporate and cloud-based networks that use the software.

REvil subsequently claimed responsibility for the incident and claimed to have encrypted more than one million systems. The group then demanded a ransom of $70m (£50.5m) in Bitcoin for the release of a universal decryption tool that would allow those affected to recover their crucial files.

Hacking experts warn that such attacks are likely to become more frequent, and suggest businesses cannot afford to underestimate the hidden impact the pandemic has had on their vulnerability. A recent survey from the leading security firm, Tessian, found that 56% of senior IT technicians believe their employees have picked up bad cyber-security habits while working from home. Furthermore, the survey found that many employees agreed with that assessment. 

  • Nearly two in five (39%) admitted that their cyber-security practices at home were less thorough than those practiced in the office, with half admitting that this is a result of feeling less scrutinised by their IT departments now, than prior to Covid. 

Experts also warn of a significant growth in the number of coronavirus-themed phishing emails targeting employees, being reported by several companies around the world. Attacks are rising not only because of remote working but as criminals become more organised and ransomware attacks become easier to execute.

The only reason ransomware remains lucrative is because victims pay the ransom, opting to do so because they think it is as the best way to restore the network. But paying the ransom means attacks will just continue. Employers, management and employees need to act quickly to plug potential security threats to ensure their businesses continues to operate safely and avoids any hack that may affect themselves and their clients.

Velocity-Smart:       IT Governance:      Forbes:      SOSCanHelp:         Digiday:     

ZDNet:      Guardian:       BBC

You Might Also Read:

Will Governments Ban Ransom Payments To Hackers?:

 

« New Tools Optimise Use Of Existing Data
Nexperia - A Bigger Threat Than Huawei? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.